A Legislative Regime Dr. Adrian McCullagh Information Security Institute Queensland University of

advertisement
Cyber Crime & Information Security
A Legislative Regime
Dr. Adrian McCullagh
Information Security Institute
Queensland University of
Technology
Agenda
z
z
z
z
z
z
z
2
Introduction
Telecommunications
Cyber crimes Act
Federal Criminal Code
Queensland Criminal Code
Privacy Issues
Conclusion
12/03/2003
Introduction
Promoting a Culture of Cyber Security
z
z
The Australian Federal Government in recent years have
undertaken a number of steps in promoting a culture of cyber
security.
These steps have included:
z The establishment of a Trusted Information Sharing Network that
comprises various parties and industry associations directly
involved with Critical Infrastructure;
z The enactment in 2001 of the Cyber Crimes Act which
substantially improved the legal basis covering cyber crimes;
z The extension of the Privacy Act in 2001 to cover more private
organisations that hold personal information;
z The enactment of the Federal Criminal Code especially division
12 which covers “corporate Culture of Non-compliance” with
Federal, State or Territory Laws.
z The recently published “Security Breach Disclosure Guidelines”
by the Privacy Commissioner.
Introduction
Promoting a Culture of Cyber Security
z
There are two principal difficulties in developing a
national approach in Australia for promoting Cyber
Security:
z
z
Federated Environment : the Federal Government must
operate within the scope of the Australian Constitution
which at time can be restrictive in developing a national
approach;
In many industry sectored covering Critical Infrastructure
the relevant infrastructure is owned by private
organisations. For example,
z the Banking system,
z Telecommunications infrastructure,
z most transport is either privately owned or operated by
Government Owned Corporations,
z in some states the electricity network is privately owned
whilst in other states it is owned by Government Owned
Corporations.
Introduction
Promoting a Culture of Cyber Security
z
Fortunately the Commonwealth does have
legislative power to regulate:
z
z
z
Telecommunications;
Banking.
Unfortunately, the Commonwealth does not
have direct power to regulate the Power
Industry, but there has been some movement
in this arena through the enactment and
adoption by the State of the National
Electricity Law.
Telecommunications Act 1997
z
Section 313 Obligations of carriers and
carriage service providers
(1) A carrier or carriage service provider must, in
connection with:
(a) the operation by the carrier or provider of
telecommunications networks or facilities; or
(b) the supply by the carrier or provider of carriage
services;
do the carrier’s best or the provider’s best to prevent
telecommunications networks and facilities from
being used in, …, the commission of offences
against the laws of the Commonwealth or of the States
14/03/2003
6 and Territories.
Telecommunications Act 1997
z
z
Applies to Carriers and Carriage Service
Providers
Carriage Service providers include ISP and
content management providers.
7
14/03/2003
Telecommunications Act 1997
z
“do its best” : What do these words mean?
z
Kendall v. Telstra
z
z
z
z
8
Probably means do what is reasonable in the
circumstances.
Could it apply to say a denial of service attack
which would be a crime under the Cybercrimes
Act?
Do carriers have an obligation to protect clients
from such attacks?
Do Consumers have a obligation to take
reasonable actions to better protect their own
systems against illegal activity.
14/03/2003
CyberCrime Act
z
z
15th December 2001
Unauthorised access, modification or
impairment of data or electronic
communications :
z
9
now a Federal Offence
CyberCrime Act
z
z
z
Accomplice provisions - “conduct
substantially contributing to” the occurrence
of the offence
An offence will occur if there is unauthorised
access through Telecommunications
Service or unauthorised access to a
Commonwealth computer.
A commonwealth computer is any computer
that is owned or controlled by the
Commonwealth or hold commonwealth data.
10
Cybercrime Act
z
z
z
z
Telecommunications services means a
service for carrying communications by
means of guided or unguided
electromagnetic energy or both.
Impairment of communications is meant to
cover a denial of service attack.
Issue: does it cover a distributed denial of
service (DDOS) attack.
DDOS occurs when a botnet is secretly
placed upon an unsuspecting computing and
then remotely activated to form part of a
distributed attack upon a target computer.
Regulatory Obligations
Corporate Culture Offences
z
z
z
z
Company criminally liable for offences
committed by employees, where the company
has a “corporate culture of non-compliance” to
Commonwealth Laws
Strict liability for “tolerating” non-compliance
Positive duty to create and maintain a culture
of compliance with commonwealth laws. Corporate Compliance Program
Similar to Internal Audits and External Audits
for Financial records
14/03/2003
Queensland Criminal Code
z
Section 408D
z
z
z
13
(1) A person who uses a restricted computer
without the consent of the computer's controller
commits an offence.
Maximum penalty--2 years imprisonment.
(2) If the person causes or intends to cause
detriment or damage, or gains or intends to gain a
benefit, the person commits a crime and is liable to
imprisonment for 5 years.
14/03/2003
Queensland Criminal Code
z
Section 408D
z
14
(3) If the person causes a detriment or damage or
obtains a benefit for any person to the value of
more than $5 000, or intends to commit an
indictable offence, the person commits a crime and
is liable to imprisonment for 10 years.
14/03/2003
Queensland Criminal Code
z
Section 408D
z
z
z
15
"damage" includes-(a) damage to any computer hardware or software;
and
(b) for information--any alteration, addition, removal
or loss of, or other damage to, information.
14/03/2003
Queensland Criminal Code
z
Section 408D
z
"restricted computer" means a computer for which-(a) a device, code or a particular sequence of electronic impulses
is necessary in order to gain access to or to use the computer;
and
(b) the controller-(i) withholds or takes steps to withhold access to the device, or
knowledge of the code or of the sequence or of the way of
producing the code or the sequence, from other persons; or
(ii) restricts access or takes steps to restrict access to the device
or knowledge of the code or of the sequence, or to the way of
producing the sequence, to a person or a class of person
authorised by the controller. .
16
14/03/2003
Information Assets
z
“Information is valuable, but knowledge is
neither real nor personal property. A man
with a richly stored mind is not for that
reason a man of property. Authorities
which relate to property in
compositions,… belong to the law of
copyright and have no bearing upon the
question whether knowledge or
information, as such is property”.
z
Per Latham CJ. : FCT v. United Aircraft Corp.
Information Assets
z
“ Either all knowledge is property, so that
the teaching of, for example, mathematics
involves the transfer of property, or only
some knowledge is property. If only some
knowledge is property then it must be
possible to state a criterion which will
distinguish between that knowledge which
is property and that knowledge which is
not property.” Latham CJ
z
FCT v. United Aircraft Corp.
Information Assets
z
z
z
z
z
So is it possible to identify the elements
that support the position that some
information can be property.
Latham CJ. Rejected the element of
secrecy.
z Points about this case
1943 case
The case is a pre-Information
revolution/computer case
The dependence on information had not
developed
Information Assets
z
Pont Data Case:
z
z
z
z
z
The Federal Court recognised the value of information and
specifically noted that commerce was now absolutely dependent
upon information and the integrity of that information.
NOTE THE EMPHASIS ON THE INTEGRITY OF THE
INFORMATION
See also Hepples v. FTC
Smith Klein and French v. Federal Department of Community
Services and Health
Different position in other jurisdictions such as:
z Hong Kong : Koo case
z USA : Carpenter v. US
Management Responsibility
z
z
z
z
z
At Common law Management has a
fiduciary responsibility to act in the best
interests in the Company.
Traditionally this has primarily concerned
protecting the corporation’s property.
BUT THINGS HAVE CHANGED
Property is no longer the issue; the issue
now concerns ASSETS of the corporation
This is a much wider term “ASSETS”. And
will include information.
Security Breach Guidelines
z
z
z
z
z
Guidelines only apply where personal information is
the subject of the breach;
No civil liability applies;
Substantially follows the Canadian approach which
is partially based upon the Californian enactment of
2003.
Based on Shame Factor
In California notices to Secretary of Commerce for
California are made public via a web site.
Conclusion
z
z
z
Law is still developing in this arena;
Privacy could be a substantial issue in raising
awareness for security culture;
Data Breach disclosure could be the answer
but too early to tell.
Related documents
Download